Samba is a suite of programs used by machines to share files, printers, andother information.

A buffer overflow flaw was found in the way Samba creates NetBIOS replies.If a Samba server is configured to run as a WINS server, a remoteunauthenticated user could cause the Samba server to crash or executearbitrary code. (CVE-2007-5398)

A heap-based buffer overflow flaw was found in the way Samba authenticatesusers. A remote unauthenticated user could trigger this flaw to cause theSamba server to crash. Careful analysis of this flaw has determined thatarbitrary code execution is not possible, and under most circumstances willnot result in a crash of the Samba server. (CVE-2007-4572)

Red Hat would like to thank Alin Rad Pop of Secunia Research, and the Sambadevelopers for responsibly disclosing these issues.

Users of Samba are advised to ugprade to these updated packages, whichcontain backported patches to resolve these issues.

4. Solution:

Before applying this update, make sure that all previously-releasederrata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available athttp://kbase.redhat.com/faq/FAQ_58_10188